Skip to content
View 1n51d3r-hack's full-sized avatar
🥇
Hacking
🥇
Hacking

Block or report 1n51d3r-hack

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
1n51d3r-hack/README.md

👋 Hi, I'm 1n51d3r

🚀 Cybersecurity professional with 15+ years of experience in offensive security, red teaming, and digital forensics. Helping organizations strengthen their security posture through advanced testing and compliance strategies. 🎓 I hold three Master’s Degrees in Cybersecurity, both completed with highest distinction — a testament to my dedication and academic excellence in the field. Currently pursuing a PhD in Computer Science in the Air Force as a senior officer.


🧰 My Toolbox

Bug Hunter / Security Researcher — responsible disclosure experience with multiple vulnerabilities identified in Spanish Ministry of Defence environments (MCCE, I3D, EMID, CESEDEN, MDE.ES, CATA, COVE).

  • 💻 Languages: ASM, C/C++, Python, Bash, PowerShell, PHP.
  • 🔧 Tools: Burp Suite, Metasploit, Cobalt Strike, Wireshark, Prowler, Autopsy, Codesonar, Codesentry, InmunityDebugger, x32/x64dbg, IDA Pro, CodeSentry, CodeSonar, LDRA, BSTORM, Seeker, VectorCast.
  • 🛠 Frameworks: OWASP, MITRE ATT&CK, NIST, ENS, ISO 27001.
  • ☁️ Cloud: Azure, AWS.
  • 🧠 Certifications: eCPPT, CRTO, CRTO II, eWPTX, CCSP, CDPP, MITRE ATT&CK, HTB DANTE, HTB RASTALABS, HTB CYBERNETICS, HTB APTLABS, MalDev Academy Cert.
  • 🏁 CTF Player: Top 1% ATENEA CCN-CERT + Winning team at Navaja Negra 2025 (P4J4RR4C05_C4RP1N73R4C05) + TOP 5 Atenea Jornadas CCN-CERT 2025 (1st place in Web Hacking) + TOP 10 CyberGameWorld.

📊 GitHub Stats

GitHub Stats


📫 Let's Connect


“Security is not a product, it's a process.” – Bruce Schneier

Pinned Loading

  1. backupwindows backupwindows Public

    BackupAutomatizado es una pequeña utilidad en C++ para Windows que automatiza el proceso de extracción, copia incremental y compresión de archivos de copia de seguridad, además de mostrar recordato…

    C++ 1 2

  2. BADUSB BADUSB Public

    Forked from JAYMONSECURITY/BADUSB

    Bad USB payload attack

    C++ 1

  3. C2-RTO-Framework-C- C2-RTO-Framework-C- Public

    Forked from JAYMONSECURITY/JMSec-C2-RTO-Framework

    Command and Control Panel Red Team Ops C/C++

    1

  4. Metasploit-PostExplotation Metasploit-PostExplotation Public

    Forked from JAYMONSECURITY/Metasploit-PostExplotation

    Módulos que facilitan la Post Explotation Metasploit

    1

  5. user_control_activity user_control_activity Public

    Controla la actividad del usuario en Windows

    Python 1 2

  6. Windows-Server-Hardening-Bastionado Windows-Server-Hardening-Bastionado Public

    Script para bastionar Windows Server

    Batchfile 1 2